000 | 04987nam a22006015i 4500 | ||
---|---|---|---|
001 | 978-3-031-28486-1 | ||
003 | DE-He213 | ||
005 | 20240730180049.0 | ||
007 | cr nn 008mamaa | ||
008 | 230309s2023 sz | s |||| 0|eng d | ||
020 |
_a9783031284861 _9978-3-031-28486-1 |
||
024 | 7 |
_a10.1007/978-3-031-28486-1 _2doi |
|
050 | 4 | _aTK5105.5-5105.9 | |
072 | 7 |
_aUKN _2bicssc |
|
072 | 7 |
_aCOM043000 _2bisacsh |
|
072 | 7 |
_aUKN _2thema |
|
082 | 0 | 4 |
_a004.6 _223 |
245 | 1 | 0 |
_aPassive and Active Measurement _h[electronic resource] : _b24th International Conference, PAM 2023, Virtual Event, March 21-23, 2023, Proceedings / _cedited by Anna Brunstrom, Marcel Flores, Marco Fiore. |
250 | _a1st ed. 2023. | ||
264 | 1 |
_aCham : _bSpringer Nature Switzerland : _bImprint: Springer, _c2023. |
|
300 |
_aXIV, 670 p. 258 illus., 238 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aLecture Notes in Computer Science, _x1611-3349 ; _v13882 |
|
505 | 0 | _aVPNs and Infrastructure -- Measuring the Performance of iCloud Private Relay -- Characterizing the VPN Ecosystem in the Wild -- Stranger VPNs: Investigating the Geo-Unblocking Capabilities of Commercial VPN Providers -- TLS -- Exploring the evolution of the TLS certificate ecosystem -- Analysis of TLS Prefiltering for IDS Acceleration -- DissecTLS: A Scalable Active Scanner for TLS Server Configurations, Capabilities, and TLS Fingerprinting -- Applications -- A Measurement-Derived Functional Model for the Interaction between Congestion Control and QoE in Video Conferencing -- Effects of Political Bias and Reliability on Temporal User Engagement with News Articles Shared on Facebook -- Measurement Tools -- Efficient continuous latency monitoring with eBPF -- Back-to-the-Future Whois: An IP Address Attribution Service for Working with Historic Datasets -- Towards diagnosing accurately the performance bottleneck of software-based network function implementation -- Network Performance -- Evaluation of the ProgHW/SW Architectural Design Space of Bandwidth Estimation -- An In-Depth Measurement Analysis of 5G mmWave PHY Latency and its Impact on End-to-End Delay -- A Characterization of Route Variability in LEO Satellite Networks -- Topology -- Improving the Inference of Sibling Autonomous Systems -- A Global Measurement of Routing Loops on the Internet -- as2org+ : Enriching AS-to-Organization Mappings with PeeringDB -- RPKI Time-of-Flight: Tracking Delays in the Management, Control, and Data Planes -- Security and Privacy -- Intercept and Inject: DNS Response Manipulation in the Wild -- A First Look at Brand Indicators for Message Identification (BIMI) -- A Second Look at DNS QNAME Minimization -- DNS -- How Ready Is DNS for an IPv6-Only World? -- TTL Violation of DNS Resolvers in the Wild -- Operational Domain Name Classification: From Automatic Ground Truth Generation to Adaptation to Missing Values -- Web -- A First Look at Third-Party Service Dependencies of Web Services in Africa -- Exploring the Cookieverse: A Multi-Perspective Analysis of Web Cookies. -Quantifying User Password Exposure to Third-Party CDNs. | |
520 | _aThis book constitutes the proceedings of the 24th International Conference, PAM 2023, held as a virtual event, March 21-23, 2023. The 18 full papers and 9 short papers presented in this volume were carefully reviewed and selected from 80 submissions. The papers are organized in the following topical sections: VPNs and Infrastructure; TLS; Applications; Measurement Tools; Network Performance; Topology; Security and Privacy; DNS; and Web. | ||
650 | 0 |
_aComputer networks . _931572 |
|
650 | 0 |
_aApplication software. _9118769 |
|
650 | 0 |
_aCryptography. _91973 |
|
650 | 0 |
_aData encryption (Computer science). _99168 |
|
650 | 0 |
_aData protection. _97245 |
|
650 | 1 | 4 |
_aComputer Communication Networks. _9118770 |
650 | 2 | 4 |
_aComputer and Information Systems Applications. _9118771 |
650 | 2 | 4 |
_aCryptology. _931769 |
650 | 2 | 4 |
_aData and Information Security. _931990 |
700 | 1 |
_aBrunstrom, Anna. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9118772 |
|
700 | 1 |
_aFlores, Marcel. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9118773 |
|
700 | 1 |
_aFiore, Marco. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9118774 |
|
710 | 2 |
_aSpringerLink (Online service) _9118775 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783031284854 |
776 | 0 | 8 |
_iPrinted edition: _z9783031284878 |
830 | 0 |
_aLecture Notes in Computer Science, _x1611-3349 ; _v13882 _923263 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-031-28486-1 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cELN | ||
999 |
_c90160 _d90160 |